You can tell we’re in the last 10-12 days of the year when we start seeing all sorts of year end retrospectives, year’s in review, countdowns of the top ___ of ___year ending___. Well, spyware has seen a banner year in many respects and Suzi at Spyware Confidential has a rundown of the top 10 tricks used in 2005.
Here’s a brief highlight…
10. Spyware spread through Windows Media files
9. Adware companies hide their dirty work using rootkit technology
8. Internet Explorer infected through Firefox
7. Direct Revenue unleashed Aurora
6. Spam bots, keyloggers, kiddie porn connect with major adware companies
5. Spazbox domain installs massive spyware/adware – using IRC
4. Anti-spyware spread by spyware and trojans
3. Direct Revenue adware distributed through BitTorrent
2. AIM worm carries backdoor, rootkit and adware, found to be powered by world wide bot net with ties to the Middle East.
1. Sony BMG infects users with DRM rootkit
What’s distressing is that I’m sure we haven’t seen the last of these tricks… In fact given the traction that some of the rogues have made with #4 above… that may be a favored vector this coming year. I’m sure that we’ll also see other, new tactics.
Earlier this afternoon I did some work for someone that had just recently got a new DSL connection. (And Symantec Internet Security 2006). She had got tons of messenger popup spam. (LAN connection was firewalled, but the PPPoE wasn’t..(?)) Anyway, she was confused about why Symantec would be popping up asking her to download win-fix for $49… So even some of the old vectors are still common. Fortunately she didn’t bite… (and now everything is firewalled and several services are disabled.
Related PostsRelated Posts
- Major botnet building and the massive jump in spam For a few months now (since the demise of bluefrog actually) I've noticed that the level of junk mail has gone up on my own mail server. Yes, I use spamassassin to filter and tag, but the volume of stuff that's tagged has gone up (as well as the volume......
- Wordpress 2.0 plugins One of the real hesitations I had in moving current sites to Wordpress 2.0 was the thought of "what plugins will break?" From what I saw the supported plugins list was short and so was the "broken" plugins list. Which said many were likely untested. So, after I installed a......
- Update on the Internet Explorer VML vulnerability Just catching up on the days VML vulnerability news from today.... It looks as though... the exploit is now MUCH more widespread this blog has some video of an infection, what's notable is that the first take was VERY UNEVENTFUL, it was used to stealthily install a keylogger. (So that......
- Holiday Spending Guide for a New Economy If you are watching the stock market, listening to the politicians in charge, and reading the popular press, maybe you are starting to build some confidence in our economy. After all, there is nothing wrong with having some optimism during difficult times. The important question is what you do with......
- The Backswing The swing itself, to a very large degree, is actually a chain reaction if you think about it. When you make one good move, then that is generally going to lead to another good move. If on the other hand you end up making a mistake, then another mistake is......
- Spyware Adware Removal At Free Of Cost Adware and spyware have always been a major problem of using the internet and. Because of their hostile behavior, they have turned into malware. Some people intentionally use it for identity theft purpose. Some steps can help you stay away from its hazardous behavior. Use Latest Browser Using latest and......
- Botnets and spyare
- Looks as though the FTC has broken up a spyware ring
- Spyware news and musings
- Network Security guide for the home or small business network – Part 18 – What about Dialup Users?
- AIM worm